Protecting quantum computing networks against hacking threats

Professor Ebrahim Karimi, a member of uOttawa's Department of Physics and holder of the Canada Research Chair in Structured Light, and doctoral student Frédéric Bouchard observe the setup they used to clone the photons that transmit information, called qudits. Credit: University of Ottawa

As we saw during the 2016 US election, protecting traditional computer systems, which use zeros and ones, from hackers is not a perfect science. Now consider the complex world of quantum computing, where bits of information can simultaneously hold multiple states beyond zero and one, and the potential threats become even trickier to tackle. Even so, researchers at the University of Ottawa have uncovered clues that could help administrators protect quantum computing networks from external attacks.

"Our team has built the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message," said University of Ottawa Department of Physics professor Ebrahim Karimi, who holds the Canada Research Chair in Structured Light. "Once we were able to analyze the results, we discovered some very important clues to help protect quantum computing networks against potential hacking threats."

Quantum systems were believed to provide perfectly secure data transmission because until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack. Traditional computing allows a hacker to simply copy and paste information and replicate it exactly, but this doesn't hold true in the quantum computing world, where attempts to copy quantum information-or qudits-result in what Karimi refers to as "bad" copies. Until now.

For the first time, Professor Karimi's team was able to clone the photons that transmit information, namely the single carriers of light known as qubits, as well as quantum theory allows, meaning that the clones were almost exact replicas of the original information. However, in addition to undermining what was previously thought to be a perfect way of securely transmitting information, the researchers' analyses revealed promising clues into how to protect against such hacking.

"What we found was that when larger amounts of quantum information are encoded on a single photon, the copies will get worse and hacking even simpler to detect," said Frédéric Bouchard, a University of Ottawa doctoral student and lead author of an open access publication that appeared this month in the renowned journal Science Advances. "We were also able to show that cloning attacks introduce specific, observable noises in a secure quantum communication channel. Ensuring photons contain the largest amount of information possible and monitoring these noises in a secure channel should help strengthen quantum computing networks against potential hacking threats."

Karimi and his team hope that their quantum hacking efforts could be used to study quantum communication systems, or more generally to study how quantum information travels across quantum computer networks. To read their paper, visit the Science Advances website.

Related Stories

What does the future hold for computing? Experts at the Networked Quantum Information Technologies Hub (NQIT), based at Oxford University, believe our next great technological leap lies in the development of quantum computing.

Xi-Jun Ren and Yang Xiang from Henan Universities in China, in collaboration with Heng Fan at the Institute of Physics of the Chinese Academy of Sciences, have produced a theory for a quantum cloning machine able to produce ...

When the quantum computer was imagined 30 years ago, it was revered for its potential to quickly and accurately complete practical tasks often considered impossible for mere humans and for conventional computers. But, there ...

Recommended for you

Wok tossing is essential for making a good fried rice—or so claim a group of researchers presenting new work at the American Physical Society's Division of Fluid Dynamics 71st Annual Meeting, which will take place Nov. ...

One-fifth of global electricity consumption is based on lighting; efficient and stable white-light emission with single materials is ideal for applications. Photon emission that covers the entire visible spectrum is, however, ...

Soot belches out of diesel engines, rises from wood- and dung-burning cookstoves and shoots out of oil refinery stacks. According to recent research, air pollution, including soot, is linked to heart disease, some cancers ...

Microscopes make the invisible visible. And compared to conventional light microscopes, transmission x-ray microscopes (TXM) can see into samples with much higher resolution, revealing extraordinary details. Researchers across ...

When Konrad Rykaczewski moved to Arizona's Sonora Desert region six years ago he took a water bottle and sprayed the plants in his front yard, not to water them, but to see how they interacted with water droplets.

0 comments

Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.